VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201812-0685 CVE-2018-20393 plural Technicolor Product Vulnerabilities in certificate and password management CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
plural Technicolor Product Contains a vulnerability related to certificate and password management.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Technicolor CGA0111 etc. are the modem products of the French Technicolor Group. A security vulnerability exists in several Technicolor products. A remote attacker could exploit this vulnerability to obtain credentials by sending SNMP requests. The following products and versions are affected: Technicolor CGA0111 CGA0111E-ES-13-E23E-c8000r5712-170217-0829-TRU ​​version; CWA0101 CWA0101E-A23E-c7000r5712-170315-SKC version; Version; TC7110.AR STD3.38.03 version; TC7110.B STC8.62.02 version; TC7110.D STDB.79.02 version; TC7200.d1I TC7200.d1IE-N23E-c7000r5712-170406-HAT version;
VAR-201812-0670 CVE-2018-20377 Orange Livebox Vulnerable to cross-site request forgery CVSS V2: 10.0
CVSS V3: 9.8
Severity: Critical
Orange Livebox 00.96.320S devices allow remote attackers to discover Wi-Fi credentials via /get_getnetworkconf.cgi on port 8080, leading to full control if the admin password equals the Wi-Fi password or has the default admin value. This is related to Firmware 01.11.2017-11:43:44, Boot v0.70.03, Modem 5.4.1.10.1.1A, Hardware 02, and Arcadyan ARV7519RW22-A-L T VR9 1.2. Orange Livebox Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Orange Livebox Contains an input validation vulnerability.Information may be tampered with. The Orange Livebox is an ADSL (Asymmetric Digital Subscriber Line) modem. A security vulnerability exists in Orange Livebox version 00.96.320S. A remote attacker could exploit this vulnerability by sending a GET request to the /get_getnetworkconf.cgi URI to obtain the device's SSID and WI-FI password
VAR-201812-0686 CVE-2018-20394 plural Thomson Vulnerabilities related to certificate and password management in product devices CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Thomson DWG849 STC0.01.16, DWG850-4 ST9C.05.25, DWG855 ST80.20.26, and TWG870 STB2.01.36 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. plural Thomson Product devices contain vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Thomson DWG849 etc. are all modem products. A security vulnerability exists in several Thomson products. The following products and versions are affected: Thomson DWG849 STC version 0.01.16; DWG850-4 ST9C.05.25 version; DWG855 ST80.20.26 version; TWG870 STB version 2.01.36
VAR-201812-0662 CVE-2018-20369 Barracuda Message Archiver Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Barracuda Message Archiver 2018 has XSS in the error_msg exception-handling value for the ldap_user parameter to the cgi-mod/ldap_load_entry.cgi module. The injection point of the issue is the Add_Update module. The solution supports indexing and saving of all e-mail, and can enhance operational efficiency and enforce compliance policies. A remote attacker could exploit this vulnerability to inject malicious scripts into client web application requests
VAR-201905-1053 CVE-2018-9193 Windows for Fortinet FortiClient Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. Windows for Fortinet FortiClient Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet FortiClient is prone to multiple local privilege-escalation vulnerabilities. An attacker can exploit these issues to gain the elevated privileges on the system. Failed exploit attempts may result in a denial of service condition. Fortinet FortiClient 6.0.4 and prior are vulnerable. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products
VAR-201905-1052 CVE-2018-9191 Windows for Fortinet FortiClient Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attackers to execute unauthorized code or commands via the named pipe responsible for Forticlient updates. Windows for Fortinet FortiClient Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet FortiClient is prone to multiple local privilege-escalation vulnerabilities. An attacker can exploit these issues to gain the elevated privileges on the system. Failed exploit attempts may result in a denial of service condition. Fortinet FortiClient 6.0.4 and prior are vulnerable
VAR-201905-0762 CVE-2018-13368 Windows for Fortinet FortiClient Vulnerabilities related to authorization, permissions, and access control CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the command injection. Windows for Fortinet FortiClient Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet FortiClient is prone to multiple local privilege-escalation vulnerabilities. An attacker can exploit these issues to gain the elevated privileges on the system. Failed exploit attempts may result in a denial of service condition. Fortinet FortiClient 6.0.4 and prior are vulnerable. Fortinet FortiClient is a mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. Vulnerabilities in permissions and access control issues exist in Fortinet FortiClient version 6.0.4 based on the Windows platform. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products
VAR-201812-0753 CVE-2018-20342 Floureon IP Camera SP012 Vulnerabilities related to authorization, permissions, and access control CVSS V2: 7.2
CVSS V3: 6.8
Severity: MEDIUM
The Floureon IP Camera SP012 provides a root terminal on a UART serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. Floureon IP Camera SP012 Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
VAR-201902-0659 CVE-2018-3990 WIBU-SYSTEMS WibuKey.sys Buffer error vulnerability CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability. WIBU-SYSTEMS WibuKey.sys Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Wibu Systems WibuKey Digital Rights Management is prone to multiple input-validation vulnerabilities. Attackers can exploit these issues to obtain sensitive information, to execute arbitrary code in the context of the user running the application. Failed exploit attempts may result in a denial-of-service condition. WibuKey versions prior to 6.50 are vulnerable
VAR-201902-0658 CVE-2018-3989 WIBU-SYSTEMS WibuKey.sys Vulnerable to information disclosure CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability. WIBU-SYSTEMS WibuKey.sys Contains an information disclosure vulnerability.Information may be obtained. Wibu Systems WibuKey Digital Rights Management is prone to multiple input-validation vulnerabilities. Attackers can exploit these issues to obtain sensitive information, to execute arbitrary code in the context of the user running the application. Failed exploit attempts may result in a denial-of-service condition. WibuKey versions prior to 6.50 are vulnerable
VAR-201902-0660 CVE-2018-3991 WibuKey Buffer error vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability. WibuKey Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Wibu Systems WibuKey Digital Rights Management is prone to multiple input-validation vulnerabilities. Attackers can exploit these issues to obtain sensitive information, to execute arbitrary code in the context of the user running the application. Failed exploit attempts may result in a denial-of-service condition. WibuKey versions prior to 6.50 are vulnerable. Network server management is one of the network server managers
VAR-201812-1210 No CVE NA300 PLC has a logic design vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
NA300 PLC is a medium-sized programmable controller. There is a loophole in the logic design of the NA300 PLC. An attacker can illegally read the PLC internal logic program by constructing a specific data packet
VAR-201812-1203 No CVE NA300 PLC has unauthorized operation vulnerability (CNVD-2018-26208) CVSS V2: 2.1
CVSS V3: -
Severity: LOW
NA300 PLC is a medium-sized programmable controller. NA300 PLC has an unauthorized operation vulnerability. Attackers can use the vulnerability to remotely tamper with the system's inputs and outputs, variable values, etc
VAR-201812-1211 No CVE Weak password vulnerability in NA300 PLC CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
NA300 PLC is a medium-sized programmable controller. The NNA300 PLC has a weak password vulnerability. An attacker could gain full control of the PLC through this vulnerability
VAR-201812-1204 No CVE NA300 PLC has unauthorized operation vulnerability CVSS V2: 3.3
CVSS V3: -
Severity: LOW
NA300 PLC is a medium-sized programmable controller. NA300 PLC has an unauthorized operation vulnerability. An attacker can remotely tamper with the MAIN program in the PLC using the vulnerability
VAR-201812-1206 No CVE Asian Control Kingview has a local elevation of privilege vulnerability CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
KingView is the first industrial configuration software product launched by Beijing Yakong Technology Co., Ltd. in China. There is a local privilege escalation vulnerability in KingView. Allows an attacker to exploit a vulnerability to submit a specially crafted request to execute arbitrary code in the application context. Asia Control Technology Configuration King (KingView) A local elevation of privilege vulnerability exists
VAR-201812-1209 No CVE Buffer overflow vulnerability in NA300 PLC CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
NA300 PLC is a medium-sized programmable controller. NA300 PLC has a buffer overflow vulnerability. The vulnerability stems from et *** 's failure to properly handle functions. An attacker can overwrite the return address by constructing a variable length exceeding the variable v30
VAR-201812-1207 No CVE Delta WPLSoft has a buffer overflow vulnerability CVSS V2: 2.1
CVSS V3: -
Severity: LOW
WPLSoft is a plc programming tool. Delta WPLSoft has a buffer overflow vulnerability. Attackers can construct malformed data and cause software to crash
VAR-201812-1205 No CVE Information disclosure vulnerability in NA300 PLC CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
NA300 PLC is a medium-sized programmable controller. Information disclosure vulnerability exists in NA300 PLC. An attacker could use the vulnerability to leak the PLC ftp service account and password
VAR-201812-1208 No CVE Command injection vulnerability in NA300 PLC CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
NA300 PLC is a medium-sized programmable controller. Command injection vulnerability exists in NA300 PLC. The vulnerability stems from the inability of the ehtdbg program in the system to properly handle input parameters. An attacker can bypass the check by constructing parameters, inject commands, and gain server permissions. , Get server permissions